byterover-cli-memory-layer
Fail
Audited by Gen Agent Trust Hub on May 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill instructs users to install the ByteRover CLI by piping a remote shell script directly to the shell:
curl -fsSL https://byterover.dev/install.sh | sh. This pattern is highly dangerous as it executes unverified code from an external source. - [REMOTE_CODE_EXECUTION]: Installation via
npm install -g byterover-clidownloads and executes code from the public NPM registry. - [REMOTE_CODE_EXECUTION]: The
brv hub installandbrv connectors installcommands allow for the dynamic download and execution of additional logic and integrations. - [CREDENTIALS_UNSAFE]: The tool manages sensitive API keys for over 20 LLM providers (e.g., Anthropic, OpenAI, Google) and stores them in a local configuration file at
.brv/config.json. It also suggests the use of environment variables for secret storage. - [DATA_EXFILTRATION]: The
brv push,brv pull, andbrv vc push/pullcommands transmit local project context and version history to thebyterover.devcloud service, posing a risk of sensitive data exposure. - [COMMAND_EXECUTION]: The ByteRover CLI includes "code exec" tools that can be invoked by the agent, potentially allowing for arbitrary command execution on the host system.
- [DATA_EXFILTRATION]: The ability to add custom registries and external knowledge sources via
brv hub registry addandbrv source addcreates vectors for unauthorized data transfer to untrusted endpoints. - [PROMPT_INJECTION]: This skill presents a significant vulnerability to indirect prompt injection.
- Ingestion points: Untrusted data enters the agent context through local project files via
brv curateand external project links viabrv source add(SKILL.md). - Boundary markers: The instructions lack any requirement for boundary markers or delimiters to isolate untrusted content from agent instructions.
- Capability inventory: The skill provides high-privilege capabilities including file system access, network synchronization, and arbitrary code execution (SKILL.md).
- Sanitization: There is no documented mechanism for sanitizing or validating external content before it is processed by the LLM or executed as code.
Recommendations
- HIGH: Downloads and executes remote code from: https://byterover.dev/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata